EasyManua.ls Logo

ZyXEL Communications XS3700 Series - SSH Overview; How SSH Works

ZyXEL Communications XS3700 Series
440 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 43 Access Control
XS3700 Series User’s Guide
371
43.5 SSH Overview
Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure
communication protocol that combines authentication and data encryption to provide secure
encrypted communication between two hosts over an unsecured network.
Figure 257 SSH Communication Example
43.6 How SSH works
The following table summarizes how a secure connection is established between two remote hosts.
Privilege Type the privilege level for this user. At the time of writing, users may have a privilege
level of 0, 3, 13, or 14 representing different configuration rights as shown below.
0 - Display basic system information.
3 - Display configuration or status.
13 - Configure features except for login accounts, SNMP user accounts, the
authentication method sequence and authorization settings, multiple logins,
administrator and enable passwords, and configuration information display.
14 - Configure login accounts, SNMP user accounts, the authentication method
sequence and authorization settings, multiple logins, and administrator and enable
passwords, and display configuration information.
Users can run command lines if the sessions privilege level is greater than or equal to
the command’s privilege level. The session privilege initially comes from the privilege
of the login account. For example, if the user has a privilege of 5, he/she can run
commands that requires privilege level of 5 or less but not more.
Apply Click Apply to save your changes to the Switch’s run-time memory. The Switch loses
these changes if it is turned off or loses power, so use the Save link on the top
navigation panel to save your changes to the non-volatile memory when you are done
configuring.
Cancel Click Cancel to begin configuring this screen afresh.
Table 205 Management > Access Control > Logins (continued)
LABEL DESCRIPTION

Table of Contents

Related product manuals